Security Incidents Analysis: Global Patterns and Trends

Since 1997... 3025 humanitarian workers have died, 3002 humanitarian workers have been wounded, 2136 humanitarian workers have been kidnapped.

1 Introduction

This page provides a global overview of security incidents using data from the Aid Worker Security Database. We explore geographic and temporal trends and break down key variables used in the dataset to better understand patterns of violence against humanitarian personnel.

The international analysis sets the stage before diving into individual country reports.

2 Dataset Overview

Dataset contains 4314 incidents across 95 countries
Time period covered: 1997 to 2025

3 Global Incident Distribution

Security incidents aren’t distributed evenly across the world. Some regions experience higher concentrations due to various factors including geopolitical tensions, economic disparities, and historical conflicts. Visualizing this distribution helps us identify global patterns.

The map below displays incidents across the globe, with colors indicating the severity based on the number of people affected:

  • Blue: No reported casualties
  • Green: 1-5 affected individuals
  • Orange: 6-20 affected individuals
  • Red: More than 20 affected individuals

Clustering is used to manage dense areas where multiple incidents occurred in close proximity.

Make this Notebook Trusted to load map: File -> Trust Notebook

The interactive map reveals that incidents are highly concentrated in specific regions, especially across parts of Africa and the Middle East.

You can zoom in on specific regions and click on individual markers to get more details about each incident, such as the country, year, total affected, and attack type.

5 Global Breakdown Across Key Variables

Before diving into individual country profiles, we want to first examine global trends across the key variables in the dataset—such as attack type, context, actor involvement, motive, etc. By analyzing these patterns at a global scale, we can establish an overall understanding of how security incidents are documented, what types of information are commonly missing or uncertain, and which trends emerge across countries. This foundation will help us better interpret the nuances of each country’s data in the following sections.

5.1 Types of Injuries and Their Contexts

Understanding how different attack types affect aid workers is crucial for response planning and preparedness. Each method of violence—whether gunfire, explosives, or abduction—carries unique risks and medical implications.

5.1.1 Common Attack Types

  • Shooting: Gunfire directed at individuals or vehicles, often during ambushes.

  • Kidnapping: Abduction for ransom, leverage, or forced cooperation.

  • Bodily Assault: Physical violence such as beatings.

  • Aerial Bombardment / Shelling: Explosives from air or artillery that may strike aid targets.

  • Kidnap-Killing: Abductions ending in execution.

  • Roadside / Vehicle-borne IEDs: Explosives planted on roads or in cars.

  • Other Explosives: Includes grenades, landmines, or suicide devices.

5.2 Attack Contexts

Understanding the context of each security incident helps identify common risk environments and inform response planning. Ambushes and individual attacks are among the most frequent, while raids and detentions reflect more organized or prolonged threats. These distinctions guide preparedness strategies, from route planning to physical site protection.

  • Combat/Crossfire: Occurs when aid workers are caught between opposing armed groups during active fighting.

  • Ambush: Sudden, premeditated attacks—often while traveling—posing high risk due to surprise and mobility.

  • Individual Attack: Targeted violence against specific aid workers, often outside group or convoy settings.

  • Raid: Coordinated intrusion into compounds or facilities with the intent to steal, intimidate, or harm.

  • Detention: When personnel are held—formally or informally—by state or non-state actors, sometimes for leverage.

5.3 Nationals vs. Internationals

Aid workers from local communities often face greater risks than their international counterparts. This visualization compares casualties—killed, wounded, and kidnapped—by staff category.

  • Nationals: Local staff face the majority of casualties, likely due to higher numbers, greater exposure, and fewer protective resources.

  • Internationals: Though better protected, they are often targeted for kidnapping due to political visibility or ransom value.

These differences emphasize the need for inclusive protection strategies tailored to both national and international aid workers.

5.3.1 Factors Contributing to Disparity

  1. Numbers and Exposure: Locals far outnumber internationals in most areas
  2. Access to Protection: Internationals often have enhanced security measures and evacuation options
  3. Targeting Patterns: Some actors specifically avoid targeting internationals due to potential international consequences
  4. Risk Profiles: Internationals may have more restricted movement in high-threat areas

5.4 Gender Distribution of Affected Individuals

Understanding how security incidents affect different gender groups provides important insights into vulnerability patterns and protection needs.

5.4.1 Analysis of Gender Patterns

The gender distribution of individuals affected by security incidents reveals several significant patterns:

5.4.2 Male Predominance

  • Males constitute the majority of individuals affected by security incidents
  • The disparity may reflect different exposure levels due to gender roles in some contexts

5.4.3 Contributing Factors

  1. Occupational Exposure: Males may be overrepresented in certain high-risk professions. Armed groups may specifically target men for recruitment, detention, or elimination as potential threats.
  2. Mobility Patterns: Gender differences in freedom of movement may affect exposure to risks.
  3. Targeting Patterns: In some contexts, males may be specifically targeted.
  4. Reporting Biases: Incidents affecting females may be underreported in some settings. This data may underrepresent violence against women, particularly sexual violence, is often underreported in conflict zones due to stigma and limited access to reporting mechanisms.

5.5 Organizations Affected by Security Incidents

Different types of organizations face varying levels of security risk based on their mandates, visibility, and operational contexts.

5.6 Organizational Risk Profiles

Different organizations face varying security risks based on numerous factors:

  • International NGO: A non-governmental organization that operates across multiple countries, providing humanitarian aid, development support, or advocacy on global issues.

  • National NGO: A non-governmental organization that operates primarily within a single country, addressing local or national humanitarian, social, or development needs.

United Nations (UN): An international organization made up of member states, working to maintain peace, provide humanitarian aid, and promote human rights and development worldwide.

  • National Red Cross / Red Crescent: Independent national societies that are part of the International Red Cross and Red Crescent Movement, providing emergency response, disaster relief, and health services within their own countries.

  • Red Cross: A neutral, impartial humanitarian organization focused on protecting and assisting victims of armed conflict and promoting international humanitarian law.

5.6.1 Security Implications by Organization Type

  1. Organization-specific protocols: Security measures should be tailored to each organization’s unique risk profile
  2. Resource allocation: Security resources should be distributed equitably based on risk
  3. Coordination mechanisms: Inter-organizational security collaboration enhances protection for all
  4. Training requirements: Staff need organization-specific security training

5.7 Comparison of Actor Types

Understanding which actors are responsible for security incidents helps identify patterns of responsibility and develop appropriate mitigation strategies.

5.7.1 Analysis of Actor Responsibility

This analysis focuses specifically on two major actor types responsible for security incidents: Host State forces and Foreign/coalition forces. This comparison reveals important patterns:

5.7.2 Host State vs. Foreign Forces

  • Host State: The national government or military of the country where a humanitarian operation or conflict is taking place.
  • Foreign or Coalition Force: Military forces from one or more countries operating in a foreign nation, often as part of international coalitions or peacekeeping missions.

5.7.3 Implications for Security Planning

  1. Context-specific approaches: Security strategies should reflect the predominant actor types in each area
  2. Engagement strategies: Different approaches may be needed when engaging with different security

6 Countries with Most Incidents: All-Time Analysis

First, let’s look at which countries have experienced the most security incidents over the entire period covered by our dataset:

This visualization highlights the countries that have historically been most affected by security incidents. Several factors might contribute to a country appearing on this list:

  • Long-standing regional conflicts
  • Political instability
  • Higher population (which can increase the absolute number of incidents)
  • More comprehensive reporting of incidents

8 Conclusion

This global analysis provides a comprehensive overview of the security challenges faced by humanitarian personnel across time and geography. By breaking down patterns in attack types, contexts, affected demographics, and organizational exposure, we gain insight into the evolving nature of these risks. While some regions remain persistent hotspots, new threats continue to emerge, underscoring the need for real-time monitoring and adaptive security strategies.

9 Next Steps

9.1 Analyze Individual Countries